Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
9 Cards in this Set
- Front
- Back
Confidentiality |
preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information |
|
Integrity |
guarding against improper information modification or destruction, including ensuring information non-repudiation and authenticity _____unauthorized modifications or destruction of information |
|
availability |
ensuring timely and reliable access to an use of information ______ disruption of access to or use of information or an information system |
|
authenticity |
property of being genuine and veing able to be verified and trusted; confidence in the validity of a transmission, a message, or message orginator |
|
accountability |
security goal that generates the requirement for actions of an entity to be traced uniquely to that entity |
|
adversary |
entity that attacks, or is a threat to a system |
|
attack |
an assault on system security that derives from an intelligent threat; that is, an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system |
|
countermeasure |
action, device, procedure, or technique that reduces a threat, vulnerability or an attack by eliminating or preventing it, by minimizing the harm it can a use or by discovering and reporting it so that corrective action can be taken |
|
risk |
an expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful resutl |